General

  • Target

    JaffaCakes118_f1cb074e31de59b60d3ae858a45f8c93ed0bf0dea2a023399d98b7c1bfbcafba

  • Size

    161KB

  • Sample

    241230-yzw3cawrdm

  • MD5

    5bf77af12c1e4f6d3d3256fc3262e285

  • SHA1

    07a7cd3967a99f0ed8831779f4e972e38b2a6c00

  • SHA256

    f1cb074e31de59b60d3ae858a45f8c93ed0bf0dea2a023399d98b7c1bfbcafba

  • SHA512

    12a0db830b5bea54473710ce2d0e5eb16773fe90f46ce013d5e776d6d257cac3c4389884065896a6b0bc5890d15246dbe48cdfd5243c32c359be695aa6a4b8d6

  • SSDEEP

    3072:gaSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2BGkFY:NnS62Fl+pkeJl3CvRStrFl+EYE

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_f1cb074e31de59b60d3ae858a45f8c93ed0bf0dea2a023399d98b7c1bfbcafba

    • Size

      161KB

    • MD5

      5bf77af12c1e4f6d3d3256fc3262e285

    • SHA1

      07a7cd3967a99f0ed8831779f4e972e38b2a6c00

    • SHA256

      f1cb074e31de59b60d3ae858a45f8c93ed0bf0dea2a023399d98b7c1bfbcafba

    • SHA512

      12a0db830b5bea54473710ce2d0e5eb16773fe90f46ce013d5e776d6d257cac3c4389884065896a6b0bc5890d15246dbe48cdfd5243c32c359be695aa6a4b8d6

    • SSDEEP

      3072:gaSuywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2BGkFY:NnS62Fl+pkeJl3CvRStrFl+EYE

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks